US12144060B2 - Cellular signal mesh network - Google Patents
Cellular signal mesh network Download PDFInfo
- Publication number
- US12144060B2 US12144060B2 US17/365,119 US202117365119A US12144060B2 US 12144060 B2 US12144060 B2 US 12144060B2 US 202117365119 A US202117365119 A US 202117365119A US 12144060 B2 US12144060 B2 US 12144060B2
- Authority
- US
- United States
- Prior art keywords
- computing device
- message
- radio
- cellular signal
- signaling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/318—Received signal strength
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
- H04W52/0229—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/03—Reselecting a link using a direct mode connection
- H04W36/035—Reselecting a link using a direct mode connection in self-organising networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present disclosure relates generally to a cellular signal mesh network.
- a computing device can be a smartphone, a wearable device, a tablet, a laptop, a desktop computer, or a smart assistant device, for example.
- the computing device can receive and/or transmit voice calls and/or messages via cables, cellular networks, Wi-Fi, or other channels.
- the computing device can include or be coupled to one or more memory devices.
- Memory devices are typically provided as internal, semiconductor, integrated circuits in computers or other electronic systems. There are many different types of memory including volatile and non-volatile memory. Volatile memory can require power to maintain its data (e.g., host data, error data, etc.) and includes random access memory (RAM), dynamic random-access memory (DRAM), static random-access memory (SRAM), synchronous dynamic random-access memory (SDRAM), and thyristor random access memory (TRAM), among others.
- RAM random access memory
- DRAM dynamic random-access memory
- SRAM static random-access memory
- SDRAM synchronous dynamic random-access memory
- TAM thyristor random access memory
- Non-volatile memory can provide persistent data by retaining stored data when not powered and can include NAND flash memory, NOR flash memory, and resistance variable memory such as phase change random access memory (PCRAM), resistive random-access memory (RRAM), and magnetoresistive random access memory (MRAM), such as spin torque transfer random access memory (STT RAM), among others.
- PCRAM phase change random access memory
- RRAM resistive random-access memory
- MRAM magnetoresistive random access memory
- STT RAM spin torque transfer random access memory
- FIG. 1 illustrates an example of a computing device using a cellular signal mesh network in accordance with a number of embodiments of the present disclosure.
- FIG. 2 illustrates an example of a cellular signal mesh network in accordance with a number of embodiments of the present disclosure.
- FIG. 3 illustrates a flow diagram associated with a cellular signal mesh network in accordance with a number of embodiments of the present disclosure.
- FIG. 4 is a flow diagram of a method associated with a cellular signal mesh network in accordance with a number of embodiments of the present disclosure.
- the present disclosure includes methods and apparatuses related to determining, via a processing resource of a first computing device, whether a cellular signal of the first computing device is below a threshold cellular signal, transmitting from the first computing device to a second computing device, via a radio of the first computing device, first signaling including data representing a request for operational data of the second computing device in response to determining that the cellular signal of the first computing device is below the threshold cellular signal, receiving from the second computing device, via the radio of the first computing device, second signaling comprising the operational data of the second computing device, and transmitting from the first computing device to the second computing device, via the first radio of the first computing device, third signaling including data representing at least one of a voice call, a video call, or a message in response to receiving the second signaling comprising the operational data.
- the threshold cellular signal can be a cellular signal strength needed to transmit signaling including the data representing at least one of the voice call, the video call, or the message from the first computing device to a third computing device. Accordingly, the threshold cellular signal can change depending on the type of operation the first computing device is trying to perform. For example, the threshold cellular signal may be higher when making a video call than when sending a text message.
- the first computing device can search for one or more different computing devices to receive and relay the first computing device's voice call, video call, and/or message by transmitting signaling including data representing the request to the one or more different computing devices able to receive signaling within the threshold cellular signal.
- the first computing device can receive operational data including at least one of: a battery level, a cellular availability, a computing device type, a privacy setting, a cellular signal strength, a type of cellular signal, a location, or an available bandwidth of the one or more computing devices.
- the first computing device can choose the second computing device over the other different computing devices in response to having the most conditions met.
- each operational characteristic included in the operational data can have a weight associated with it. For example, a cellular signal strength may have a higher weight than the type of cellular signal because transmitting the message is more important than the speed of transmission. Accordingly, the first computing device may choose the second computing device with a 3G cellular signal type and a high cellular signal strength rather than another computing device with a 5G cellular signal type and a low cellular signal strength.
- the first computing device can send the voice call, video call, and/or message to the selected device.
- the second computing device as the selected device, can receive and relay the voice call, video call, and/or message to the cellular network tower and/or the third computing device.
- the first computing device, the second computing device, the third computing device, and/or the cellular network tower can be included in and communicatively coupled to each other via a cellular signal mesh network.
- a number of something can refer to one or more of such things.
- a number of computing devices can refer to one or more computing devices.
- a “plurality” of something intends two or more.
- designators such as “X”, as used herein, particularly with respect to reference numerals in the drawings, indicates that a number of the particular feature so designated can be included with a number of embodiments of the present disclosure.
- reference numeral 100 may reference element “0” in FIG. 1
- a similar element may be referenced as 200 in FIG. 2 .
- a plurality of similar, but functionally and/or structurally distinguishable, elements or components in the same figure or in different figures may be referenced sequentially with the same element number (e.g., 200 - 1 , 200 - 2 , and 200 -X in FIG. 2 ).
- FIG. 1 illustrates an example of a computing device 100 using a cellular signal mesh network in accordance with a number of embodiments of the present disclosure.
- the computing device 100 can include a memory 102 , a radio 104 , a processing resource 106 , and a user interface 108 .
- the memory 102 can be any type of storage medium that can be accessed by the processing resource 106 to perform various examples of the present disclosure.
- the memory 102 can be a non-transitory computer readable medium having computer readable instructions (e.g., computer program instructions) stored thereon that are executable by the processing resource 106 to determine, via the processing resource 106 of the computing device 100 , whether a cellular signal of the computing device 100 is below a threshold cellular signal, transmit from the computing device 100 to a different computing device, via the radio 104 of the computing device 100 , first signaling including data representing a request for operational data of the different computing device in response to determining that the cellular signal of the computing device 100 is below the threshold cellular signal, receive from the different computing device, via the radio 104 of the computing device 100 , second signaling comprising the operational data of the different computing device, and transmit from the computing device 100 to the different computing device, via the radio 104 of the computing device 100 , third signaling including data representing at least one of: a voice call,
- signaling can include a communication (e.g., a radio signal) that carries data from one location to another.
- the computing device 100 can include a communication device (e.g., intermediary device), such as, but not limited to, radio 104 .
- the memory 102 can store operational data 110 .
- the operational data 110 can include operational characteristics, such as, a battery level, a cellular availability, a computing device type, a privacy setting, a cellular signal strength, a type of cellular signal, a location, or an available bandwidth of the computing device 100 .
- the battery level can be a percentage of battery life and/or an amount of time remaining in the battery of the computing device 100 . In some examples, when the battery level is zero or the time remaining in the battery life is zero, the computing device 100 may turn off.
- the computing device 100 may not have cellular availability. In some examples, the computing device 100 may have cellular availability when the computing device 100 is not using its cellular signal to make a call or send a message and/or when another computing device is not using the cellular signal of the computing device 100 to make a call and/or send a message.
- the computing device type can include a brand, a model, an operating system, a software version, a type of memory, a type of processor, a type of radio, and/or a year of the computing device 100 .
- the security or performance of the computing device 100 may be determined based on the computing device type. For example, a computing device with the latest software version may have patched software bugs that security hackers were able to exploit in older software versions to make the computing device more secure than a computing device with an older software version.
- the privacy setting of the computing device 100 can also indicate how secure the computing device 100 is.
- a privacy setting can include whether the computing device 100 requires a code, facial scan, and/or a fingerprint scan, for example.
- a computing device 100 that requires a facial scan may be determined to be more secure than a computing device 100 requiring a four-digit code, for example.
- a cellular signal strength is a signal the computing device 100 receives from a cellular network tower.
- the cellular signal strength can be measured in decibel-milliwatts (dBm).
- the cellular signal strength of the computing device 100 can vary depending on the location of the computing device 100 relative to cellular network towers. For example, a computing device 100 located behind a mountain from a cellular network tower may have a lower cellular signal strength than a computing device 100 located on the top of the mountain.
- GPRS General packet radio service
- EDGE enhanced data rates for GSM evolution
- 3G third generation
- HSPA+ evolved high-speed packet access
- 4G fourth generation
- 5G fifth generation
- the computing device 100 may only by capable of using certain types of cellular signals. For example, some computing devices may not be able to support 5G.
- a computing device supporting 5G may be preferred over a computing device supporting 4G because 5G can have greater speed and lower latency than 4G.
- a location of the computing device 100 may dictate whether the computing device 100 is used to relay a call and/or message. For example, if the computing device 100 is located between a cellular network tower and a different computing device, the different computing device may send a voice call, a video call, and/or a message to the computing device 100 to relay the voice call, the video call, and/or the message to the cellular network tower. In a number of embodiments, the computing device 100 can be further away from the cellular network tower than the different computing device, but the computing device 100 may have a less obstructed signal to the cellular network tower than the different computing device.
- the different computing device and the computing device 100 can be located behind a mountain from a cellular tower, however the different computing device may be located at the base of the mountain while the computing device 100 may be located miles away from the base of the mountain so that the mountain is not obstructing the cellular signal of the computing device 100 .
- the different computing device that may have a lower cellular signal because its signal is obstructed by the mountain can send the voice call, the video call, and/or the message to the computing device 100 to relay the voice call, the video call, and/or the message to the cellular network tower.
- An available bandwidth of the computing device 100 can dictate whether the computing device 100 is used to relay the voice call, the video call, and/or the message for the different computing device.
- the available bandwidth of the computing device 100 can determine an amount of data that can be transmitted in a particular amount of time.
- the computing device 100 may be selected to transmit the voice call, the video call, and/or the message if it has available bandwidth, a higher available bandwidth, and/or the highest available bandwidth because it may be able to transmit the voice call, the video call, and/or the message faster than other computing devices and/or it may be able to transmit a higher quality version of the voice call, the video call, and/or the message than other computing devices.
- the computing device 100 can receive requests and/or operational data from other computing devices.
- the user interface 108 can be generated by computing device 100 in response to receiving requests, operational data, and/or one or more commands.
- the user interface 108 can be a graphical user interface (GUI) that can provide and/or receive information to and/or from the user of the computing device 100 .
- GUI graphical user interface
- the user interface 108 can be shown on a display of the computing device 100 .
- a request for operational data can be displayed on the user interface 108 .
- computing device 100 can receive a user command via the user interface 108 in response to displaying the request for operational data.
- the computing device 100 receiving a request for operational data can determine whether one or more conditions are met prior to transmitting the operational data and/or prior to relaying the voice call, the video call, or the message. For example, if computing device 100 is private, computing device 100 may only transmit operational data to trusted devices and/or only relay a voice call, a video call, and/or a message for a trusted device.
- a request can include credentials of the computing device requesting the operational data. Computing device 100 can compare the credentials to a number of credentials of trusted devices stored in memory 102 . If the credentials match one of the number of credentials of trusted devices, the computing device requesting the operational data can be determined to be a trusted device.
- credentials can include a serial number, an email address, a phone number, and/or an address associated with the computing device.
- a central computing device can determine whether the computing device 100 should transmit the operational data to the different computing device and/or relay the voice call, the video call, and/or the message for the different computing device.
- the central computing device can receive the request for operational data and/or the request to relay the voice call, the video call, and/or the message.
- the central computing device can also receive operational data from computing device 100 and determine whether the computing device 100 should relay the voice call, the video call, and/or the message based on the request and the operational data.
- FIG. 2 illustrates an example of a cellular signal mesh network 210 in accordance with a number of embodiments of the present disclosure.
- the cellular signal mesh network 210 can include a number of computing devices 200 - 1 , 200 - 2 , . . . , 200 -X and a number of cell towers 220 .
- Computing devices 200 - 1 , . . . , 200 -X can correspond to computing device 100 in FIG. 1 .
- computing device 200 - 1 can send a voice call, a video call, and/or a message to computing device 200 -X.
- the computing device 200 - 1 can require a cellular signal that exceeds a threshold cellular signal. If computing device 200 - 1 does not have a cellular signal that exceeds the threshold cellular signal to transmit the call and/or message to cellular network tower 220 , computing device 200 - 1 can search for different computing devices that its cellular signal can reach.
- Computing device 200 - 2 can be within computing device 200 - 1 cellular signal reach.
- computing device 200 - 1 can transmit the voice call, the video call, and/or the message to computing device 200 - 2 .
- Computing device 200 - 2 can receive and relay the voice call, the video call, and/or the message to cellular network tower 220 , and cellular network tower 220 can receive and relay the voice call, the video call, and/or the message to computing device 200 -X.
- FIG. 3 illustrates a flow diagram 329 associated with a cellular signal mesh network in accordance with a number of embodiments of the present disclosure.
- the flow diagram 329 illustrates selection of a computing device on a cellular signal mesh network to transmit a voice call, a video call, and/or a message in accordance with a number of embodiments of the present disclosure.
- a computing device e.g., computing device 200 - 1 in FIG. 2
- the computing device is locked 338 , the computing device is not allowed to transmit calls and/or messages via other computing devices. Accordingly, the process of selecting a different computing device on a cellular signal mesh network to relay the voice call, the video call, and/or the message ends.
- the computing device can request operational data from all computing devices 344 .
- the computing device can request operational data from any computing device within cellular signal reach of the computing device.
- Trusted devices can be devices with particular hardware.
- a trusted device can include a particular memory device.
- the particular memory device can be more secure than other memory devices.
- the computing device can include a list of trusted devices. If the computing device is private 334 , the computing device may only send requests for operational data from computing devices on the list of trusted devices.
- the computing device can receive operational data 346 from a number of different computing devices.
- the computing device can use the operational data to score the number of different computing devices 348 .
- a processing resource e.g., processing resource 106 in FIG. 1
- the threshold battery level can be based on the battery level necessary to transmit the voice call, the video call, and/or the message.
- the threshold battery level can be stored in memory (e.g., memory 102 in FIG. 1 ) on the computing device.
- a computing device of the number of different computing devices with the highest and/or a higher battery level may be chosen to transmit the voice call, the video call, and/or the message because a computing device with a higher battery level can perform better than a computing device with a lower battery level that may be in a power savings mode with one or more functions disabled to conserve battery power.
- a computing device of the number of different computing devices can at least be partially scored based on its battery level and/or whether its battery level exceeds the threshold battery level.
- a cellularly-available computing device of the number of different computing devices scores higher than a cellularly-unavailable computing device of the number of different computing devices. For example, a computing device of the number of different computing devices is cellularly unavailable if the computing device of the number of different computing devices is currently performing a voice call, a video call, and/or a message.
- a computing device of the number of different computing devices may score higher depending on the type of device it is.
- a computing device of the number of different computing devices set to a more secure privacy setting may score higher than a computing device set to a less secure privacy setting and/or a computing device of the number of different computing devices having (e.g., supporting) a particular type of cellular signal may score higher than a computing device having another type of cellular signal.
- the processing resource of the computing device can compare a cellular signal strength of a computing device of the number of different computing devices to a threshold cellular signal strength and/or a signal strength of each of the number of different computing devices.
- the threshold cellular signal strength can be based on the cellular signal strength necessary to transmit the voice call, the video call, and/or the message.
- the threshold cellular signal strength can be stored in memory on the computing device.
- a computing device of the number of different computing devices can at least be partially scored based on its cellular signal strength and/or whether its cellular signal strength exceeds the threshold cellular signal strength.
- the computing device can determine its location using, for example, a global positioning system (GPS).
- the computing device of the number of different computing devices can include its location in the operational data.
- the computing device can compare its location with the location of the computing device of the number of different computing devices to determine a distance between them.
- the computing device can score the computing device of the number of different computing devices based on whether it is within a particular distance and/or whether it is closer to the computing device than the other computing devices of the number of different computing devices.
- the distance between the computing device and the computing device of the number of different computing devices can be a filter to narrow down the number of possible computing devices to request operational data from and/or to relay the voice call, the video call, and/or the message.
- the computing device can detect ten different computing devices, but only five of the number of different computing devices are between the computing device and a nearest cellular network tower. In response to determining that only five of the number of different computing devices are between the computing device and the nearest cellular network tower, the computing device can send requests for operational data to the five different computing devices in parallel instead of using additional memory and processing resources to send requests to all ten different computing devices.
- the processing resource of the computing device can compare an available bandwidth of a computing device of the number of different computing devices to a threshold bandwidth and/or an available bandwidth of each of the number of different computing devices.
- the threshold bandwidth can be based on the bandwidth necessary to transmit the voice call, the video call, and/or the message.
- the threshold bandwidth can be stored in memory on the computing device.
- a computing device of the number of different computing devices can at least be partially scored based on its available bandwidth and/or whether its available bandwidth exceeds the threshold bandwidth.
- the computing device may only request operational data from, receive operational data from, score, and/or select a computing device of the number of different computing devices that is a trusted device.
- the computing device may be public, but score a computing device of the number of different computing devices higher if it is a trusted computing device.
- the processing resource of the computing device can compare credentials of each of the number of different computing devices to a number of credentials stored in memory on the computing device to determine which, if any, of the number of different computing devices are trusted.
- a central computing device can receive the request, the operational data of each of the number of different computing devices, and/or score each of the number of different computing based on the operational data to determine which computing device of the number of different computing devices should relay a voice call, a video call, and/or a message.
- the computing device and/or the central computing device can select a device 350 based on the scoring of the number of different computing devices.
- Each operational characteristic of the operational data can be weighted.
- the weights can be preset on the computing device or a user can assign weights to each operational characteristic.
- the weights can be set based on the priority of the manufacturer and/or user. If the manufacturer and/or user wants the best performance, the type of cellular signal may be weighted higher than a privacy setting. If the manufacturer and/or user wants to keep their data secure, the privacy setting may be weighted higher than the available bandwidth of a computing device of the number of different computing devices, for example.
- the computing device can transmit the voice call, the video call, and/or the message to the selected device 352 . If the voice call, the video call, and/or the message is completed 354 by the selected computing device, the process of selecting a different computing device to relay the voice call, the video call, and/or the message on the cellular signal mesh network is complete and the process ends 340 .
- the voice call, the video call, and/or the message can be determined to be completed and the voice call, the video call, and/or the message can be marked as complete in response to receiving a confirmation message from the selected computing device.
- the computing device selects another computing device 350 .
- the computing device and/or the central computing device can select the next computing device with the next highest score and transmit the voice call, the video call, and/or the message to the computing device with the next highest score.
- FIG. 4 is a flow diagram of a method 460 associated with a cellular signal mesh network in accordance with a number of embodiments of the present disclosure.
- the cellular signal mesh network can include a number of computing devices and/or a number of cellular network towers.
- the method 460 can include determining, via a processing resource of a first computing device, whether a cellular signal of the first computing device is below a threshold cellular signal.
- the threshold cellular signal can be a signal strength necessary to transmit signaling including the data representing at least one of the voice call, the video call, or the message from the first computing device to a third computing device. Accordingly, the threshold cellular signal can change depending on the type of operation the user is trying to perform. For example, the threshold cellular signal may be higher when making a video call than when sending a text message.
- the method 460 can include transmitting from the first computing device to a second computing device, via a radio of the first computing device, first signaling including data representing a request for operational data of the second computing device in response to determining that the cellular signal of the first computing device is below the threshold cellular signal.
- the first computing device can search for a number of computing devices, including the second computing device, to relay the voice call, the video call, and/or the message by transmitting the request for operational data to a number of computing devices.
- the second computing device can be within cellular signal reach of the first computing device.
- the first computing device requests operational data from the second computing device even if it is not a trusted device. For example, the first computing device requests operational data from any device, including the second computing device, within cellular signal reach of the first computing device. If the first computing device is set to private, the first computing device requests operational data from the second computing device if it is a trusted device.
- the method 460 can include receiving from the second computing device, via the radio of the first computing device, second signaling comprising the operational data of the second computing device.
- the operational data can include a battery level, a cellular availability, a computing device type, a privacy setting, a cellular signal strength, a location, and/or an available bandwidth of the second computing device.
- the method 460 can include transmitting from the first computing device to the second computing device, via the radio of the first computing device, third signaling including data representing at least one of: a voice call, a video call, or a message in response to receiving the second signaling comprising the operational data.
- the first computing device can transmit the third signaling in response to the battery level of the second computing device exceeding a threshold battery level, the second computing device having cellular availability, the second computing device being a particular type of device, the second computing device being set to a particular privacy setting, the cellular signal strength of the second computing device exceeding a threshold cellular signal strength, the second computing device having a particular type of cellular signal, the second computing device being within a particular distance of the first computing device, and/or the available bandwidth of the second computing device exceeding a threshold bandwidth.
- the second computing device can receive and relay the voice call, the video call, and/or the message to a cellular network tower.
- the cellular network tower can receive and relay the voice call, the video call, and/or the message to the intended recipient, the third computing device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (19)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/365,119 US12144060B2 (en) | 2020-12-17 | 2021-07-01 | Cellular signal mesh network |
| US18/911,299 US20250039657A1 (en) | 2008-10-31 | 2024-10-10 | Device for bone adjustment with anchoring function |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202063127045P | 2020-12-17 | 2020-12-17 | |
| US17/365,119 US12144060B2 (en) | 2020-12-17 | 2021-07-01 | Cellular signal mesh network |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/973,551 Continuation US11065041B2 (en) | 2008-10-31 | 2018-05-08 | Device and method for bone adjustment with anchoring function |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/911,299 Continuation US20250039657A1 (en) | 2008-10-31 | 2024-10-10 | Device for bone adjustment with anchoring function |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| US20230007466A1 US20230007466A1 (en) | 2023-01-05 |
| US20240284161A9 US20240284161A9 (en) | 2024-08-22 |
| US12144060B2 true US12144060B2 (en) | 2024-11-12 |
Family
ID=84785757
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/365,119 Active 2042-02-24 US12144060B2 (en) | 2008-10-31 | 2021-07-01 | Cellular signal mesh network |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US12144060B2 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20250024357A1 (en) * | 2023-07-10 | 2025-01-16 | Apple Inc. | Determining and Presenting an Indication of a Closest Cellular Service Location |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8923186B1 (en) | 2003-05-08 | 2014-12-30 | Dynamic Mesh Networks, Inc. | Chirp networks |
| US8976733B2 (en) | 2003-05-08 | 2015-03-10 | Dynamic Mesh Networks, Inc. | Persistent mesh for isolated mobile and temporal networking |
| US9019956B2 (en) | 2003-05-08 | 2015-04-28 | Dynamic Mesh Networks, Inc. | Self-forming VoIP network |
| US9258765B1 (en) | 2003-05-08 | 2016-02-09 | Dynamic Mesh Networks, Inc. | Chirp networks |
| US9363651B1 (en) | 2003-05-08 | 2016-06-07 | Dynamic Mesh Networks, Inc. | Chirp networks |
| US20170280487A1 (en) * | 2016-03-24 | 2017-09-28 | Google Inc. | Automatic wireless communication protocol toggling |
| US9853719B2 (en) | 2013-06-09 | 2017-12-26 | Apple Inc. | Discovery of nearby devices for file transfer and other communications |
| AU2018202458B2 (en) | 2014-05-30 | 2019-11-21 | Apple Inc. | Activity continuation between electronic devices |
| US10630937B1 (en) * | 2018-12-19 | 2020-04-21 | Motorola Solutions, Inc. | Device, system and method for transmitting one or more of annotations and video prior to a video call |
| US20200202376A1 (en) * | 2018-12-21 | 2020-06-25 | Noodle Technology Inc. | Validation in a decentralized network |
-
2021
- 2021-07-01 US US17/365,119 patent/US12144060B2/en active Active
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8923186B1 (en) | 2003-05-08 | 2014-12-30 | Dynamic Mesh Networks, Inc. | Chirp networks |
| US8976733B2 (en) | 2003-05-08 | 2015-03-10 | Dynamic Mesh Networks, Inc. | Persistent mesh for isolated mobile and temporal networking |
| US9019956B2 (en) | 2003-05-08 | 2015-04-28 | Dynamic Mesh Networks, Inc. | Self-forming VoIP network |
| US9258765B1 (en) | 2003-05-08 | 2016-02-09 | Dynamic Mesh Networks, Inc. | Chirp networks |
| US9363651B1 (en) | 2003-05-08 | 2016-06-07 | Dynamic Mesh Networks, Inc. | Chirp networks |
| US9853719B2 (en) | 2013-06-09 | 2017-12-26 | Apple Inc. | Discovery of nearby devices for file transfer and other communications |
| AU2018202458B2 (en) | 2014-05-30 | 2019-11-21 | Apple Inc. | Activity continuation between electronic devices |
| US20170280487A1 (en) * | 2016-03-24 | 2017-09-28 | Google Inc. | Automatic wireless communication protocol toggling |
| US10630937B1 (en) * | 2018-12-19 | 2020-04-21 | Motorola Solutions, Inc. | Device, system and method for transmitting one or more of annotations and video prior to a video call |
| US20200202376A1 (en) * | 2018-12-21 | 2020-06-25 | Noodle Technology Inc. | Validation in a decentralized network |
Also Published As
| Publication number | Publication date |
|---|---|
| US20230007466A1 (en) | 2023-01-05 |
| US20240284161A9 (en) | 2024-08-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10299191B2 (en) | Method and device for establishing wireless connection | |
| US10880823B2 (en) | Method and device method and device for obtaining access information of shared wireless access point | |
| EP2901739B1 (en) | Mixed off-site / on-site prediction computation for reducing wireless reconnection time of a computing device | |
| US11601874B2 (en) | Uplink carrier access | |
| AU2017203814A1 (en) | Determining location information using a location data point provided by a computing device | |
| US10492236B2 (en) | Method and device for establishing wireless connection | |
| CN106411878B (en) | Method, device and system for making access control strategy | |
| US10031916B2 (en) | Methods and systems for virtualizing and managing cloud storage sources | |
| WO2016180210A1 (en) | Method and apparatus for accessing wifi network | |
| US20120143943A1 (en) | Cloud service system and method, and recording medium | |
| US11714918B1 (en) | Automated data privacy compliance system | |
| US12144060B2 (en) | Cellular signal mesh network | |
| US20160080378A1 (en) | Identifying untrusted network access points | |
| US20170126806A1 (en) | Cloud file processing method and apparatus | |
| CN114528264A (en) | Data synchronization method and system | |
| US10506544B2 (en) | Method and equipment for distinguishing homonymic wireless access points | |
| US10936968B2 (en) | Ticket routing | |
| CN115243313A (en) | 5G network identification method and device and electronic equipment | |
| CN108495356B (en) | A method and device for filtering wireless access points | |
| CN112291287A (en) | Cloud platform-based containerized application network flow control method and device and storage medium | |
| US8990425B1 (en) | Determining device location based on domain name response | |
| US20150379548A1 (en) | Method and System for Data Processing | |
| CN109257402B (en) | Request quantity control method and equipment | |
| US11853593B2 (en) | Shared memory protection method for securing MMIO commands | |
| US12461782B2 (en) | Sharing data between computing devices |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CRANE, KARI;VERMA, DEEPTI;VADIVEL, SHRUTHI KUMARA;AND OTHERS;SIGNING DATES FROM 20210428 TO 20210614;REEL/FRAME:056732/0486 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| FEPP | Fee payment procedure |
Free format text: PETITION RELATED TO MAINTENANCE FEES GRANTED (ORIGINAL EVENT CODE: PTGR); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |